[1]
B. Aravind and D. Murugan, “Hijacking Spoofing Attack and Defence Strategy Based on Secured Network Protocols”, Int. J. Comp. Sci. Eng., vol. 7, no. 8, pp. 66–70, Nov. 2025.